DeviceLock 7.2 Build 46357 Final Full keygen
DeviceLock 7.2 Build 46357 Final
Leakage prevention begins with the context of control - block or allow data to specific users based on the data types, interfaces, network protocols or device types, data direction, day of week and time of day, etc. In many cases, requires a deeper level of control of information - for example, checking the transmitted data on the availability of personal data in an environment where input-output ports are open and not controlled. To solve such problems additional mechanisms used content analysis and filtering to prevent unauthorized transmission of data.
DeviceLock Endpoint DLP Suite provides both context and content-based analysis of monitoring data, providing the highest level of information leakage prevention at minimum cost for the purchase and maintenance of the complex. Built in DeviceLock mechanisms provide granular control of user access to the widest range of peripherals and data channels. What's more - how to handle data protection in addition to the context control can be applied methods of content analysis and filtering, allowing them to avoid the transfer of both the external drives and Plug-and-Play devices, and network protocols beyond the corporate network.
Software system DeviceLock Endpoint DLP Suite is made up of complementary functional modules - DeviceLock, NetworkLock, ContentLock and DeviceLock Search Server (DLSS), licensed option in any combination to meet the challenges of information security services.
DeviceLock is a basic component of the infrastructure and the core platform for other software components and realizes all the functions of its central management and administration. DeviceLock 7 supports a complete set of mechanisms to control user access context, and provides event-logging (audit) and the shadow copy data for all local channels of input and output on the protected computers, including peripherals and interfaces, the system clipboard, locally connected smartphones and PDAs and a channel print documents on local and network printers. In addition, DeviceLock component includes all the Central Management Console.
Component NetworkLock ™ provides contextual control channel network communications on company computers, including recognition of network protocols, regardless of the ports with the detection of communications applications and selective blocking, message and session reconstruction with file recovery, data and settings, as well as event-logging and shadowing transmitted data. NetworkLock component controls the transfer of messages by the open and SSL-protected SMTP-sessions (with separate control messages and attachments), web-access and other HTTP / HTTPS-applications, web-mail to Gmail ™, Yahoo! Mail ™, Windows Live ® Mail , Mail.ru, GMX.de, Web.de, instant messenger ICQ ®, MSN ® Messenger, Jabber ®, IRC, Yahoo! Messenger ™, Mail.ru Agent, social networks Twitter ™, Facebook ®, LiveJournal ™, LinkedIn ®, MySpace ™, Classmates ™, VKontakte ™, transfer files via FTP and FTP-SSL, a well Telnet-session.
The component implements mechanisms ContentLock ™ content-monitoring and filtering of files and data transferred to / from removable media and network communications channels - Web mail and social networks, instant messaging, file sharing via FTP and FTP-SSL, etc. In addition , content filtering technology to allow you to specify the module ContentLock filtering for shadow data to keep only the files and data that are important for the problems of information security audit, investigation of abnormal situations and forensic analysis.
Component DeviceLock Search Server (DLSS) provides full text search on the centralized database shadowing and event logging DeviceLock. DLSS server can significantly reduce the labor-intensive and more efficient processes for audit and investigation of information security incidents involving leaks of information, their forensic analysis and collect evidence. Module is licensed independently.
In companies that use software and hardware data encryption, DeviceLock allows security services remotely centrally manage policies encryption provides guaranteed employees use of cryptographic tools in the storage and transfer of data on removable media. For example, certain employees or groups of employees can use only the specified USB flash drives read and write data, while other employees will only be able to read data from unencrypted removable media, but not write to them.
DeviceLock provides the ability to provide the highest level of detailed control devices and network protocols, unattainable using standard Group Policy Windows - and provides it with an interface transparently integrable in the Group Policy Editor Windows Group Policy Editor, which allows you to easily manage access control in large enterprise networks.
Features:
• Controlling access to users or groups, USB, Wi-Fi and Bluetooth adapters, PDAs, CD-ROM, floppy disks and other removable media
• Control access to devices depending on the time of day and day of week
• Provide users temporary access to USB with no network connection
• Protect against users with local administrator privileges
• Protect disks from accidental or intentional formatting
• Control with centralized management
• Obtaining a complete log of port and device
• Reporting on permissions and settings that have been set
Download link
0 comments :
Post a Comment